Applies to Product: | USM Appliance™ | LevelBlue OSSIM® |
An authenticated scan is a vulnerability testing measure performed from the vantage of a logged-in user. The quality and depth of an authenticated scan depends on the privileges granted to the authenticated user account. The following are the recommended system settings for creating a designated account for authenticated scans.
Operating System | Methods and Credentials | Escalation |
---|---|---|
Windows | Windows username and password through Server Message Block (SMB) | None |
Linux | SSH password or public key authentication | sudo or su |
macOS | SSH password or public key authentication | sudo or su |
Windows
Windows Configurations | Settings |
---|---|
General System Configurations |
|
Group Configurations |
|
Policy Configurations |
|
Creating a Windows Admin Account
LevelBlue recommends that the admin create a designated administrator account solely for the authenticated scans rather than using an established administrator account or a guest account. Create the Windows account using the name AV Authenticated Account and a secure password. The account configuration must be set to Classic: Local Users Authenticate as Themselves.
For more information about creating credentials for authenticated scans in USM Appliance, see Creating Credentials for Vulnerability Scans.
Creating a Security Group
To create a security group
-
Log in to the Active Directory on the Domain Controller.
-
Go to Start > Programs > Administrative Tools > Active Directory Users and Computers.
-
Click Select Action > New > Group to create a new security group.
-
Name the group LevelBlue Authenticated Scan.
-
For Group Scope select Global.
-
For Group Type select Security.
-
Click OK to add the group.
-
Add the account that you will be using for the authenticated scans to the LevelBlue Authenticated Scan group.
To create a group policy
-
Click Start > All Programs > Accessories > Run, and then type gpmc.msc in the text box to open the Group Policy Management window.
-
In the Group Policy Management window, right-click Group Policy Objects, and then select New.
-
Name the policy LevelBlue Security Rights, and then click OK.
-
In the Group Policy Management Editor, click the LevelBlue Security Rights policy to open the policy in the right pane.
-
Click on the Scope tab, and then in the Security Filtering section, click Add to insert the group.
-
In the Enter the Object Name to Select field, add the LevelBlue Authenticated Scan group to the policy, and then click OK.
Configuring Policies
The following configurations are optional steps you can take in the Group Policy Management Editor to remove unnecessary user rights. These steps are not required for running the authenticated scans, but they do provide extra measures of internal security.
To deny local logins
-
Right-click on the LevelBlue Security Rights policy, and then select Edit.
-
In User Rights Assignment, double-click Deny Log on Locally.
-
Click Add User or Group.
-
Click Browse, enter LevelBlue Authenticated Scan, and then click Check Names.
-
Click OK.
To deny Remote Desktop Services log
- Right-click the LevelBlue Security Rights policy, and then select Edit.
- In User Rights Assignment, double-click Deny Log Through Remote Desktop Services.
- Select Define These Policy Settings.
- Click Add User or Group.
- Click Browse, enter LevelBlue Authenticated Scan, and then click Check Names.
- Click OK.
To configure permissions
-
Right-click File Systems, and then select Add File.
-
Enter %SystemDrive%.
-
Under Group or User Names, click Add.
-
Enter LevelBlue Authenticated Scan.
-
Click OK.
-
In the LevelBlue Authenticated Scan group, select the authenticated user.
-
Deselect any permissions that are marked in the Allowed column, and then select Deny for the Write permission.
-
Click OK.
-
In the Object window, select Configure This File or Folder Then and Propagate Inheritable Permissions to All Subfolders and Files, and then click OK.
To configure registries
-
Click Registry, and then select Add Key.
-
Select Users, and then click OK.
-
Click Advanced, and then click Add.
-
Enter the LevelBlue Authenticated Scan group, and then click OK.
-
In the Permissions Entry Objects window's Apply To field, select This Object and Child Objects.
-
In the Permissions section below, select Deny for Set Value, Create Subkey, Create Link, Delete, Change Permissions, and Take Ownership. No checkboxes should be set to Allow.
-
Click OK and confirm the changes.
-
Select Configure This Key Then and Propagate Inheritable Permissions to All Subkeys radio buttons, and then click OK.
-
Repeat these steps for the Machine and Classes Root Registries as well.
Linux
To perform authenticated scans on USM Appliance from a Linux system, the user must have root privileges. The Linux login is performed through SSH, while USM Appliance performs the authentication either with a password or an SSH key stored in USM Appliance. The Linux account used for authenticated scans must be able to perform uname commands and read and execute Debian (.deb and .dpkg) or Red Hat (.rpm) files. Public Key Authentication must not be prohibited by the SSH daemon with the line PubkeyAuthentication no.
For more information about creating credentials for authenticated scans in USM Appliance, see Creating Credentials for Vulnerability Scans.
macOS
To perform authenticated scans on USM Appliance from a macOS, the user must have root privileges.
To enable SSH access on macOS
For more information about creating credentials for authenticated scans in USM Appliance, see Creating Credentials for Vulnerability Scans.